2023 IEEE 24th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)最新文献

筛选
英文 中文
A Picture is Worth 1,000 Millimeters: Combining Vision and Wi-Fi to Improve Localization 一张图片价值1000毫米:结合视觉和Wi-Fi提高定位
Shazal Irshad, Eric Rozner, Apurv Bhartia, Bo Chen
{"title":"A Picture is Worth 1,000 Millimeters: Combining Vision and Wi-Fi to Improve Localization","authors":"Shazal Irshad, Eric Rozner, Apurv Bhartia, Bo Chen","doi":"10.1109/WoWMoM57956.2023.00020","DOIUrl":"https://doi.org/10.1109/WoWMoM57956.2023.00020","url":null,"abstract":"In the past, researchers designed, deployed, and evaluated Wi-Fi based localization techniques in order to locate users and devices without adding extra or costly infrastructure. However, as infrastructure deployments change, one must reexamine the role of Wi-Fi localization. Today, cameras are becoming increasingly deployed, and therefore this work examines how contextual and vision data obtained from cameras can be integrated with Wi-Fi localization techniques. We present an approach called CALM that works on commodity APs and cameras. Our approach contains several contributions: a camera line fitting technique to restrict the search space of candidate locations, single AP and camera localization via a deprojection scheme inspired from 3D cameras, simple and robust AP weighting that analyzes the context of users via the camera, and a new virtual camera methodology to scale analysis. We motivate our scheme by analyzing real camera and AP topologies from a major vendor. Our evaluation over 9 rooms and 102,300 wireless readings shows CALM can obtain decimeter-level accuracy, improving performance over previous Wi-Fi techniques like FTM by $2.7times$ and SpotFi by $2.3times$.","PeriodicalId":132845,"journal":{"name":"2023 IEEE 24th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"369 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124626775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
D3PicoNet: Enabling Fast and Accurate Indoor D-Band Millimeter-Wave Picocell Deployment D3PicoNet:实现快速准确的室内d波段毫米波Picocell部署
Hem Regmi, Sanjib Sur
{"title":"D3PicoNet: Enabling Fast and Accurate Indoor D-Band Millimeter-Wave Picocell Deployment","authors":"Hem Regmi, Sanjib Sur","doi":"10.1109/WoWMoM57956.2023.00028","DOIUrl":"https://doi.org/10.1109/WoWMoM57956.2023.00028","url":null,"abstract":"We propose D3PicoNet, which allows network deployers to quickly complete realistic indoor site surveys at D-band (mmWave) frequency. D3PicoNet models the mmWave reflection profile of a given environment, considering the primary reflecting objects. It then utilizes this model to identify places that optimize the efficiency of the reflectors. D3PicoNet understands an environment and deploys D-band picocells at such locations that picocells provide coverage with Non-Line-of-Sight (NLoS) paths when Line-of-Sight (LoS) is obstructed. The core module of D3PicoNet is a deep learning network that learns the relationship between the visual depth images to the mmWave signal reflection profiles and can accurately predict signal reflection profiles at any unobserved location, which allows D3PicoNet to find the best deployment locations maximizing the coverage and data rate with a minimum number of picocells in an environment. We implement and evaluate D3PicoNet on two buildings with multiple indoor environments. D3PicoNet can adapt to new environments, allowing it to be used in other indoor environments with minimal adjustments.","PeriodicalId":132845,"journal":{"name":"2023 IEEE 24th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116363310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
POSTER: Activity Graph Learning for Attack Detection in IoT Networks 海报:物联网网络中攻击检测的活动图学习
Mohamed-Lamine Messai, H. Seba
{"title":"POSTER: Activity Graph Learning for Attack Detection in IoT Networks","authors":"Mohamed-Lamine Messai, H. Seba","doi":"10.1109/WoWMoM57956.2023.00050","DOIUrl":"https://doi.org/10.1109/WoWMoM57956.2023.00050","url":null,"abstract":"IoT networks are the favorite target of cybercriminals. With more and more connected IoT devices, IoT networks offer large attack surface. There are many potential entry points for cybercriminals in these networks. Hence, attack detection is an essential part of securing IoT networks and protecting against the potential harm or damage that can result from successful attacks. In this paper, we propose a graph-based framework for detecting attacks in IoT networks. Our approach involves constructing an activity graph to represent the networking events occurring during a monitoring window. This graph is a rich attributed graph capturing both structure and semantic features from the network traffic. Then, we train a neural network on this graph to distinguish between normal activities and attacks. Our preliminary experiments show that our approach is able to accurately detect a large range of attacks when the size of the monitoring window is correctly set.","PeriodicalId":132845,"journal":{"name":"2023 IEEE 24th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125826948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Electric Vehicle Intelligent Charging Scheduling Strategy in Real Traffic Scenarios 真实交通场景下的电动汽车实时智能充电调度策略
Yue Yang, Gang Pan, Jinghua Zhu
{"title":"Real-Time Electric Vehicle Intelligent Charging Scheduling Strategy in Real Traffic Scenarios","authors":"Yue Yang, Gang Pan, Jinghua Zhu","doi":"10.1109/WoWMoM57956.2023.00042","DOIUrl":"https://doi.org/10.1109/WoWMoM57956.2023.00042","url":null,"abstract":"With the rapid development of social production and the economy, environmental problems have increasingly become prominent. Electric vehicles are very popular due to their characteristics of zero pollution emmissions, which has led to the increasing scale of electric vehicles. As the number of electric vehicles increases, the problem of traffic congestion has become more and more serious, and the difficulty of charging has become a problem for people. How to solve the timeliness and uncertainty of electric vehicle charging and reduce the electric vehicle’s charging costs are two challenges in the new energy field. In this paper, we focus on the real-time electric vehicle charging problem with the consideration of road conditions and weather influence. By constructing state, action, system reward, and state transition functions, the problem of electric vehicle charging scheduling is formulated as a Markov Decision Process. We propose a Soft Actor-Critic algorithm based on deep reinforcement learning to dynamically learn the optimal charging strategy with the aim of minimizing charging time and battery power consumption for users, to improve the charging experience. In addition, we design a deep learning model for real-time electricity price prediction to assist intelligent charging decisions and further save charging costs for users. Numerical experimental results verify the effectiveness and superiority of our proposed method.","PeriodicalId":132845,"journal":{"name":"2023 IEEE 24th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130356249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Admission Control with Latency Considerations for 5G Mobile Edge Computing 考虑延迟的5G移动边缘计算准入控制
Ye Zhang, Wuyungerile Li, Winston K.G. Seah
{"title":"Admission Control with Latency Considerations for 5G Mobile Edge Computing","authors":"Ye Zhang, Wuyungerile Li, Winston K.G. Seah","doi":"10.1109/WoWMoM57956.2023.00031","DOIUrl":"https://doi.org/10.1109/WoWMoM57956.2023.00031","url":null,"abstract":"The fifth generation (5G) mobile network is a new generation of broadband mobile communication technology with the potential to address the increasing demands of new user services and applications that have stringent low latency and high bandwidth requirements. Besides the enhanced mobile broadband (eMBB) which is an evolution of broadband services from previous generations, the ultra reliable low latency communication (URLLC) service comes with stringent delay requirements that are needed to support new applications like autonomous vehicles, augmented/virtual reality, etc. Mobile or multiple access edge computing (MEC) emerged to provide services and computing resources for users at the network edge to provide faster access speeds and lower end-to-end delays. To better meet user needs and maximize resource utilization, network resources need to be allocated and managed efficiently. Admission control for user requests is one of the methods used that can effectively prevent network congestion, thereby improving the overall performance of the system. In this paper, we propose a RED-based Admission Control with Latency Considerations (REDAL) algorithm for user admission control that aims to increase throughput, meet users’ delay requirements and reduce packet discard rate. By explicitly accounting for user traffic delay constraints and bandwidth requirements, we are able to meet the strict delay constraints of URLLC traffic while meeting the bandwidth requirements of eMBB traffic. We validate our approach in an MEC scenario to demonstrate high resource utilization and also keeping the request discard rate below 20%.","PeriodicalId":132845,"journal":{"name":"2023 IEEE 24th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132208869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gesture Recognition with mmWave Wi-Fi Access Points: Lessons Learned 手势识别与毫米波Wi-Fi接入点:经验教训
Nabeel Nisar Bhat, Rafael Berkvens, J. Famaey
{"title":"Gesture Recognition with mmWave Wi-Fi Access Points: Lessons Learned","authors":"Nabeel Nisar Bhat, Rafael Berkvens, J. Famaey","doi":"10.1109/WoWMoM57956.2023.00027","DOIUrl":"https://doi.org/10.1109/WoWMoM57956.2023.00027","url":null,"abstract":"In recent years, channel state information (CSI) at sub-6 GHz has been widely exploited for Wi-Fi sensing, particularly for activity and gesture recognition. In this work, we instead explore mmWave (60 GHz) Wi-Fi signals for gesture recognition/pose estimation. Our focus is on the mmWave Wi-Fi signals so that they can be used not only for high data rate communication but also for improved sensing e.g., for extended reality (XR) applications. For this reason, we extract spatial beam signal-to-noise ratios (SNRs) from the periodic beam training employed by IEEE 802.11ad devices. We consider a set of 10 gestures/poses motivated by XR applications. We conduct experiments in two environments and with three people. As a comparison, we also collect CSI from IEEE 802.11ac devices. To extract features from the CSI and the beam SNR, we leverage a deep neural network (DNN). The DNN classifier achieves promising results on the beam SNR task with state-of-the-art 96.7% accuracy in a single environment, even with a limited dataset. We also investigate the robustness of the beam SNR against CSI across different environments. Our experiments reveal that features from the CSI generalize without additional re-training, while those from beam SNRs do not. Therefore, retraining is required in the latter case.","PeriodicalId":132845,"journal":{"name":"2023 IEEE 24th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114955316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sponsors 赞助商
{"title":"Sponsors","authors":"","doi":"10.1109/wowmom57956.2023.00013","DOIUrl":"https://doi.org/10.1109/wowmom57956.2023.00013","url":null,"abstract":"","PeriodicalId":132845,"journal":{"name":"2023 IEEE 24th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115467938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on the Influence of 5G Network planning on communication in Urban Air Mobility 城市空中交通中5G网络规划对通信的影响研究
S. Wanniarachchi, V. Turau
{"title":"A Study on the Influence of 5G Network planning on communication in Urban Air Mobility","authors":"S. Wanniarachchi, V. Turau","doi":"10.1109/WoWMoM57956.2023.00070","DOIUrl":"https://doi.org/10.1109/WoWMoM57956.2023.00070","url":null,"abstract":"The emerging implementation of urban air mobility (UAM) is in need of a robust low latency communication system. The key priority is to cope with the required high level of safety assurance. 5G communication standards lay the foundation for a promising communication infrastructure, yet there exists the challenge of connectivity and coverage through the base station network. In this paper, we address this aspect and study the realization of a reliable and efficient 5G base station plan and evaluate its influence on the performance of the UAM communication system through simulations. Our findings can assist in real UAM deployment scenarios to search for the most cost effective radio network planning solution. We focus on the 3d-channel model and on the number and placement of base stations. As a use case we consider the Hamburg metropolitan region.","PeriodicalId":132845,"journal":{"name":"2023 IEEE 24th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126353217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DP2AS—Definitive Privacy-Preserving Analytical Scheme for Healthcare Data Processing dp2as -医疗保健数据处理的最终隐私保护分析方案
Chandu Thota, C. Mavromoustakis, J. M. Batalla
{"title":"DP2AS—Definitive Privacy-Preserving Analytical Scheme for Healthcare Data Processing","authors":"Chandu Thota, C. Mavromoustakis, J. M. Batalla","doi":"10.1109/WoWMoM57956.2023.00076","DOIUrl":"https://doi.org/10.1109/WoWMoM57956.2023.00076","url":null,"abstract":"Smart healthcare systems require secure and robust data computations for providing uninterrupted monitoring, recommendation, and assistance. Wearable sensor (WS) data sources serve as the prime aggregator for data handling. Considering the security demands in sensitive healthcare data, this article introduces a Definitive Privacy-Preserving Analytical Scheme (DP2AS). The proposed scheme exploits the data classification feature based on false positives and replication. The suggested method detects redundant data in healthcare by comparing open and secure aggregation scenarios. Classifying data features as either continuous or replicating helps prevent fraudulent data insertion. By employing tree classifiers, the data attributes are accounted for in different WS aggregation intervals preventing replications. The computations are independent of false data and application-specific computations, retaining the WS privacy. In this analysis process, the error-free/ false positive fewer data chunks are concealed with user adaptable security mechanism for preventing data poisonings. The analytical model considers the previous data state with the current processing data for avoiding erroneous interruptions. The state classffier’s maximum replication mitigation provides application-specific data transfers with fast computation possibility. The proposed scheme’s performance is analyzed using the metrics false rate, data utilization, and analysis time.","PeriodicalId":132845,"journal":{"name":"2023 IEEE 24th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"4 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116766040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PEPPER: Precise Privacy-Preserving Contact Tracing with Cheap, BLE/UWB Capable Tokens 胡椒:精确的隐私保护接触追踪与廉价,BLE/UWB功能令牌
François-Xavier Molina, Vincent Roca, Roudy Dagher, E. Baccelli, N. Mitton, A. Boutet, M. Cunche
{"title":"PEPPER: Precise Privacy-Preserving Contact Tracing with Cheap, BLE/UWB Capable Tokens","authors":"François-Xavier Molina, Vincent Roca, Roudy Dagher, E. Baccelli, N. Mitton, A. Boutet, M. Cunche","doi":"10.1109/WoWMoM57956.2023.00044","DOIUrl":"https://doi.org/10.1109/WoWMoM57956.2023.00044","url":null,"abstract":"Contact Tracing (CT) is an old, recognized epi-demiological tool, and since a digital variant is now within reach, a variety of smartphone-based solutions have been rapidly developed and deployed since 2020, with mixed results and amid controversies. Yet, achieving reliable and effective digital CT at large scale is still an open problem. In this work, we contribute with an open source software platform on top of which various CT solutions can be quickly developed and tested. More specifically, we design PEPPER, which jointly leverages Bluetooth Low Energy (BLE) and Ultra Wide Band (UWB) radios for contact detection, combined with the DESIRE privacy-preserving CT protocol. We show that PEPPER+DESIRE can operate on cheap physical tokens based on low-power microcontrollers, opening new use-cases with less personal, potentially disposable devices, that could be more widely used. We also evaluate the complementarity of Bluetooth and UWB in this context, via experiments mimicking various scenarios relevant for CT. Compared to BLE-only CT, we show that UWB can decrease false negatives (e.g., in presence of human body occlusion), meaning that more actual contacts will be found, a key benefit from an epidemiological viewpoint. Our results suggest that, while PEPPER+DESIRE improves precision over state-of-the-art, further research is required to harness UWB-BLE synergy for CT in practice. To this end, our open source platform (which can run on an open-access testbed) provides a useful playground for the research community.","PeriodicalId":132845,"journal":{"name":"2023 IEEE 24th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124133993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信